User Guide

Table Of Contents
Bridge GUI Guide: Maintenance
203
an intermediate CA certificate
an end certificate corresponding to a public key manually
generated on the Bridge with the
GENERATE KEY/CSR button
(described above) or Bridge CLI
generate command (refer
to the
CLI Software Guide).
Figure 6.11.
X.509 Certificates
frame, all platforms
In order to import a signed digital certificate, you must specify:
NOTE: The certifi-
cate contains the
information necessary
to determine whether
the certificate belongs to
a CA or to an end entity
or whether it is a root
certificate.
CSR Name or Certificate Name - specifies a name for the
imported certificate, used to identify the certificate on the
Bridge.
If the certificate is an end certificate, you must select the
CSR Name associated with the certificate’s public key from
the dropdown.
If the certificate is a
trust anchor certificate, you must first
check the box to indicate this (see below), and then enter a
Certificate Name unique to the local certificate store. The
name does not have to be related to either the issuer or
subject DN in the certificate.
Trusted Anchor - when more than one root CA certificate is
present, selects which will serve as trust anchors, or root
certificates signed by trusted CAs in chains of trust
applicable to the Bridge’s current requirements.
Signed Certificate File - permits you to Browse to the location
of the certificate file to be imported.
Figure 6.12.
Upload Certificate
frame, all platforms
In addition to the certificate’s Name, the X.509 Certificates list
displays:
Subject - shows the IP address of the device that generated
the associated CSR and the subject X.500 distinguished
name (DN), consisting a concatenation of selected
attributes, or relative distinguished name (RDNs).